Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe
Resource
win7-20240221-en
General
-
Target
380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe
-
Size
594KB
-
MD5
34b8885c737fa78ecc68c1bf0628f8c0
-
SHA1
32936d1bce243a085c81147f1d569a1c20c44bb2
-
SHA256
380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0
-
SHA512
ed336237c0f5c038a1ffd2646b38c1d4cd6f4133e2be0f645f25a9e0b844c3f8f69aa6bcde18a072cc57da434006914ded57e2779084e0244dbbf44a3f193196
-
SSDEEP
12288:zQ3yvK/bBMqQOa/71j+zmxnHJaA8YPGTU+aJczbxLedJJ4iav2hcll0WEm:+yqBMqQOiLnoYeyqzbxuv4im2hcT0fm
Malware Config
Extracted
formbook
4.1
cr12
nff1291.com
satyainfra.com
hechiceradeamores.com
jfgminimalist.com
qut68q.com
pedandmore.com
sugardefender24-usa.us
somalse.com
lotusluxecandle.com
certificadobassetpro.com
veryaroma.com
thehistoryofindia.in
33155.cc
terastudy.net
84031.vip
heilsambegegnen.com
horizon-rg.info
junongpei.website
winstons.club
henslotalt.us
home-care-72875.bond
elmetaversal.com
thetrendingproduct.com
kiki-hello-jury.com
fertami.info
free-cell-phones-en-arena.sbs
emilogiska.com
airexam.in
masters-of-1.com
othersidings.com
fullpaw.com
xmmtrader.com
astronomersparadise.net
cert.agency
pools-97641.bond
forexsignals-trading.com
bxsmediaconsulting.com
perfectedskincare.com
footresort.com
warehouse-inventory-80963.bond
purifygenius.com
bolinkpass.club
velleclub.com
epuar.com
winningpickleballshots.com
spiaggia.club
kadinzuri.com
keyboards-280323.cfd
africanfemalefounders.club
tkoelectriical.com
wg5688.com
properrr.com
fortune-tiger-rede.com
65302.vip
psychologyzerodegrees.today
top99bet4d.site
priuswuxi.com
carneden.com
ptwix.xyz
furniture-70925.bond
064817.com
ferradaoffroad.com
pix2click.life
jurj.xyz
spiritualpath.info
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4040-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exedescription pid process target process PID 2908 set thread context of 4040 2908 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exepid process 4040 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 4040 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 4040 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exedescription pid process target process PID 2908 wrote to memory of 4040 2908 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe PID 2908 wrote to memory of 4040 2908 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe PID 2908 wrote to memory of 4040 2908 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe PID 2908 wrote to memory of 4040 2908 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe PID 2908 wrote to memory of 4040 2908 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe PID 2908 wrote to memory of 4040 2908 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe 380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe"C:\Users\Admin\AppData\Local\Temp\380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe"C:\Users\Admin\AppData\Local\Temp\380c21fd37cafa3619196df7b6337783921656dbf58f1f54b63c74ad411421e0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3640,i,14648456027158448592,4956305794400220180,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:81⤵PID:1908